搜索结果: 1-9 共查到“军队指挥学 re-keying”相关记录9条 . 查询时间(0.125 秒)
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version)
fault attacks block ciphers protection
2018/1/27
In this article, we propose a new method to protect block cipher implementations against Differential Fault Attacks (DFA). Our strategy, so-called ``Tweak-in-Plaintext'', ensures that an uncontrolled ...
The Universal 2nd Factor (U2F) protocol is an open authentication standard to strengthen the two-factor authentication which is required to protect our authentication details online. It augments the e...
Increasing the Lifetime of Symmetric Keys for the GCM Mode by Internal Re-keying
key lifetime re-keying key diversification
2017/7/24
In this paper we introduce a classification of existing approaches to increase the security of block cipher operation modes based on re-keying, putting the focus on so-called internal re-keying withou...
On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing
key management block ciphers counter mode
2016/6/20
This paper presents a security bound in the standard security model for the Magma cipher CTR encryption mode and the 獵ryptoPro Key Meshing?(CPKM) re-keying method that was previously used with the GOS...
Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems
Stefan Dziembowski Sebastian Faust Gottfried Herold
2016/6/6
Most leakage-resilient cryptographic constructions aim at limiting the information adversaries can obtain about secret keys. In the case of asymmetric algorithms, this is usually obtained by secret sh...
A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure
LPN Ring-LPN fresh re-keying
2016/3/2
The fresh re-keying scheme is a countermeasure designed to protect low-cost devices against side-channel attacks. In this paper, we present a new birthday-type attack based on a refined reduction to R...
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks
side-channel attacks fresh re-keying key-recovery attack
2016/1/5
At AFRICACRYPT 2010 and CARDIS 2011, fresh re-keying schemes to counter side-channel and fault attacks were introduced. The idea behind those schemes is to shift the main burden of side-channel protec...
Leakage-Resilient Symmetric Encryption via Re-keying
leakage-resilience symmetric encryption re-keying
2016/1/3
In the paper, we study whether it is possible to construct an efficient leakage-resilient symmetric scheme using the AES block cipher. We aim at bridging the gap between the theoretical leakage-resili...
Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis
side-channel analysis fresh rekeying
2014/3/12
Leakage-resilient cryptography aims at developing new algorithms for which physical security against side-channel attacks can be formally analyzed. Following the work of Dziembowski and Pietrzak at FO...